7,364 research outputs found

    Cybersecurity: mapping the ethical terrain

    Get PDF
    This edited collection examines the ethical trade-offs involved in cybersecurity: between security and privacy; individual rights and the good of a society; and between the types of burdens placed on particular groups in order to protect others. Foreword Governments and society are increasingly reliant on cyber systems. Yet the more reliant we are upon cyber systems, the more vulnerable we are to serious harm should these systems be attacked or used in an attack. This problem of reliance and vulnerability is driving a concern with securing cyberspace. For example, a ‘cybersecurity’ team now forms part of the US Secret Service. Its job is to respond to cyber-attacks in specific environments such as elevators in a building that hosts politically vulnerable individuals, for example, state representatives. Cybersecurity aims to protect cyberinfrastructure from cyber-attacks; the concerning aspect of the threat from cyber-attack is the potential for serious harm that damage to cyber-infrastructure presents to resources and people. These types of threats to cybersecurity might simply target information and communication systems: a distributed denial of service (DDoS) attack on a government website does not harm a website in any direct way, but prevents its normal use by stifling the ability of users to connect to the site. Alternatively, cyber-attacks might disrupt physical devices or resources, such as the Stuxnet virus, which caused the malfunction and destruction of Iranian nuclear centrifuges. Cyber-attacks might also enhance activities that are enabled through cyberspace, such as the use of online media by extremists to recruit members and promote radicalisation. Cyber-attacks are diverse: as a result, cybersecurity requires a comparable diversity of approaches. Cyber-attacks can have powerful impacts on people’s lives, and so—in liberal democratic societies at least—governments have a duty to ensure cybersecurity in order to protect the inhabitants within their own jurisdiction and, arguably, the people of other nations. But, as recent events following the revelations of Edward Snowden have demonstrated, there is a risk that the governmental pursuit of cybersecurity might overstep the mark and subvert fundamental privacy rights. Popular comment on these episodes advocates transparency of government processes, yet given that cybersecurity risks represent major challenges to national security, it is unlikely that simple transparency will suffice. Managing the risks of cybersecurity involves trade-offs: between security and privacy; individual rights and the good of a society; and types of burdens placed on particular groups in order to protect others. These trade-offs are often ethical trade-offs, involving questions of how we act, what values we should aim to promote, and what means of anticipating and responding to the risks are reasonably—and publicly—justifiable. This Occasional Paper (prepared for the National Security College) provides a brief conceptual analysis of cybersecurity, demonstrates the relevance of ethics to cybersecurity and outlines various ways in which to approach ethical decision-making when responding to cyber-attacks

    Spatially Averaged Quantum Inequalities Do Not Exist in Four-Dimensional Spacetime

    Get PDF
    We construct a particular class of quantum states for a massless, minimally coupled free scalar field which are of the form of a superposition of the vacuum and multi-mode two-particle states. These states can exhibit local negative energy densities. Furthermore, they can produce an arbitrarily large amount of negative energy in a given region of space at a fixed time. This class of states thus provides an explicit counterexample to the existence of a spatially averaged quantum inequality in four-dimensional spacetime.Comment: 13 pages, 1 figure, minor corrections and added comment

    Inferring the eccentricity distribution

    Full text link
    Standard maximum-likelihood estimators for binary-star and exoplanet eccentricities are biased high, in the sense that the estimated eccentricity tends to be larger than the true eccentricity. As with most non-trivial observables, a simple histogram of estimated eccentricities is not a good estimate of the true eccentricity distribution. Here we develop and test a hierarchical probabilistic method for performing the relevant meta-analysis, that is, inferring the true eccentricity distribution, taking as input the likelihood functions for the individual-star eccentricities, or samplings of the posterior probability distributions for the eccentricities (under a given, uninformative prior). The method is a simple implementation of a hierarchical Bayesian model; it can also be seen as a kind of heteroscedastic deconvolution. It can be applied to any quantity measured with finite precision--other orbital parameters, or indeed any astronomical measurements of any kind, including magnitudes, parallaxes, or photometric redshifts--so long as the measurements have been communicated as a likelihood function or a posterior sampling.Comment: Ap

    Negative Energy Densities and the Limit of Classical Space-Time

    Full text link
    Although negative energy densities are predicted by relativistic quantum field theories, I present an argument that an "operational" positivity still holds: the energy in a region, plus the energy of an isolated device which traps or measures that energy, must be positive. If we assume Einstein's field equation, this means the local geometry of a negative energy-density region cannot be measured by the trajectories of test particles. So far, all attempts to design thought-experiments to verify a classical local geometry in the negative energy-density region have failed. It seems we must impute a quantum character to such a space-time regime.Comment: 8 pages, plain Tex, no macros needed, 1998 G.R.F. Honorable Mention, to appear in Mod. Phys. Lett.

    Road Development in Asia: Assessing the Range-Wide Risks to Tigers

    Get PDF
    Roads are proliferating worldwide at an unprecedented rate, with potentially severe impacts on wildlife. We calculated the extent and potential impacts of road networks across the 1,160,000-km2, 13-country range of the globally endangered tiger (Panthera tigris)—a conservation umbrella species. We found that roads were pervasive, totaling 134,000 km across tiger conservation landscapes (TCLs), even in tiger priority sites and protected areas. Approximately 43% of the area where tiger breeding occurs and 57% of the area in TCLs fell within the road-effect zone. Consequently, current road networks may be decreasing tiger and prey abundances by more than 20%. Nearly 24,000 km of new roads will be built in TCLs by 2050, stimulated through major investment projects such as China’s Belt and Road Initiative. Given that roads will be a pervasive challenge to tiger recovery in the future, we urge decision-makers to make sustainable road development a top priority

    Predictors of crystal methamphetamine use in a community-based sample of UK men who have sex with men.

    Get PDF
    Background Crystal methamphetamine (‘crystal meth’) use by men who have sex with men is an ongoing public health issue in the UK. We conducted a descriptive epidemiological study to characterise demographic and socio-sexual risk factors for crystal meth use in a national sample of UK MSM recruited in late 2014. Methods We used data from the 2014 Gay Men's Sex Survey (n = 16,565), an online community-based survey in the UK. We used logistic regression to relate risk factors to last-year use of crystal meth. Results In univariate models, crystal meth use was significantly associated with being between the ages of 30 and 49 (30–39, OR 2.24; 40–49, OR 2.21), living in London, having received a positive HIV test result (OR 7.37, 95% CI [6.28, 8.65]), and with higher education qualifications (1.40, [1.13, 1.75]), as well as with having multiple steady (2.15, [1.73, 2.68]) and non-steady (13.83, [10.30, 18.58]) partners with condomless anal intercourse. Relationships were similar in multivariate models, but education was no longer associated with last-year crystal meth use and lack of full-time employment was. Conclusions This analysis confirms and updates previous findings from the UK. Crystal meth use may now be more concentrated in London since previous surveys. This analysis presents novel findings regarding the association between number and sexual risk with partners and last-year meth use

    Replacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants

    Get PDF
    We estimate the global BOLD Systems database holds core DNA barcodes (rbcL + matK) for about 15% of land plant species and that comprehensive species coverage is still many decades away. Interim performance of the resource is compromised by variable sequence overlap and modest information content within each barcode. Our model predicts that the proportion of species-unique barcodes reduces as the database grows and that ‘false’ species-unique barcodes remain >5% until the database is almost complete. We conclude the current rbcL + matK barcode is unfit for purpose. Genome skimming and supplementary barcodes could improve diagnostic power but would slow new barcode acquisition. We therefore present two novel Next Generation Sequencing protocols (with freeware) capable of accurate, massively parallel de novo assembly of high quality DNA barcodes of >1400 bp. We explore how these capabilities could enhance species diagnosis in the coming decades
    • …
    corecore